This paper examines transformational learning experiences of computing students as a way to better understand threshold concepts in computing. From empirical evidence we found that students often describe transformati...
详细信息
ISBN:
(纸本)9781605582160
This paper examines transformational learning experiences of computing students as a way to better understand threshold concepts in computing. From empirical evidence we found that students often describe transformative experiences as learning situations in which they were led to use various kinds of abstraction, for example modularity, data abstraction, inheritance, polymorphism, reuse, design patterns, and complexity. Some students describe an abstract concept as coming first, and then needing to be made concrete though application;others describe transformations in which they learn the advantages of these abstract concepts from their experience of not using them. Abstraction is certainly of central importance in computer science. It appears, however, from our students' descriptions of transformative experiences, that abstraction per se is not a threshold, but that particular concepts in which abstraction is paramount exhibit the characteristics of threshold concepts. Copyright 2008 ACM.
This paper proposes an interactive system for mobile devices controlled by hand gestures aimed at helping people with visual impairments. This system allows the user to interact with the device by making simple static...
详细信息
With the increasing complexity of Cyber-Physical systems, their behavior and decisions become increasingly difficult to understand and comprehend for users and other stakeholders. Our vision is to build self-explainab...
详细信息
This research proposes to modernize a legacy software system by using web services as the main building blocks of the software reengineering. For this purpose, a legacy theorem proof checking and derivation tool calle...
详细信息
ISBN:
(纸本)0769524095
This research proposes to modernize a legacy software system by using web services as the main building blocks of the software reengineering. For this purpose, a legacy theorem proof checking and derivation tool called Bertie3 is reengineered in terms of service-oriented architecture, service-oriented componentization, and external data representation and serialization. With the web services of derivation checking engines and first-order markup languages, a minimal amount of development time can be spent working on well-known and well-developed components. More time can be spent updating the features that make the tool unique. This case study shows that modernizing a software system with web services will allow the business components of the system to be easily expanded and integrated with other application components for future demands.
Customer reviews on online platforms have grown to become an important source of insight into a company's performance. Food delivery services (FDS) companies aim to effectively use customers' feedback to ident...
Customer reviews on online platforms have grown to become an important source of insight into a company's performance. Food delivery services (FDS) companies aim to effectively use customers' feedback to identify areas for improvement of customer satisfaction. Although Arabic is becoming one of the most widely used languages on the Internet, only a few studies have focused on Arabic sentiment analysis to date. The present study conducts an extensive emotion mining and sentiment analysis on FDS-related reviews in Arabic, exploiting natural language processing, and machine learning techniques to extract information that reflects customers' subjective viewpoints, recognize their feelings, and determine polarity in the FDS domain. This work begins with collecting the FDS dataset (Talabat), and then extracting and creating a dialects lexicon for Arabic dialects, followed by walking the reader through detailed steps of cleaning and pre-processing a manually annotated dataset. Finally, we examined classification algorithms including Decision Tree (DT), and Support Vector Machine (SVM). We achieved a maximum accuracy of about 82% using the SVM classifier.
Some of the most challenging problems in science and engineering are being addressed by the integration of computation and science, a research ?eld known as computational science. Computational science plays a vital r...
详细信息
ISBN:
(数字)9783540448600
ISBN:
(纸本)9783540401940
Some of the most challenging problems in science and engineering are being addressed by the integration of computation and science, a research ?eld known as computational science. Computational science plays a vital role in fundamental advances in biology, physics, chemistry, astronomy, and a host of other disciplines. This is through the coordination of computation, data management, access to instrumentation, knowledge synthesis, and the use of new devices. It has an impact on researchers and practitioners in the sciences and beyond. The sheer size of many challenges in computational science dictates the use of supercomputing, parallel and distri- ted processing, grid-based processing, advanced visualization and sophisticated algorithms. At the dawn of the 21st century the series of International Conferences on Computational Science (ICCS) was initiated with a ?rst meeting in May 2001 in San Francisco. The success of that meeting motivated the organization of the - cond meeting held in Amsterdam April 21–24, 2002, where over 500 participants pushed the research ?eld further. The International Conference on Computational Science 2003 (ICCS 2003) is the follow-up to these earlier conferences. ICCS 2003 is unique, in that it was a single event held at two di?erent sites almost opposite each other on the globe – Melbourne, Australia and St. Petersburg, Russian Federation. The conference ran on the same dates at both locations and all the presented work was published in a single set of proceedings, which you hold in your hands right now.
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ...
详细信息
The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical systems (MCPS). While these systems provide benefits to patients and professionals, they...
详细信息
暂无评论